Debian Security Advisory
DSA-1429-1 htdig -- cross site scripting
- Date Reported:
- 11 Dec 2007
- Affected Packages:
- htdig
- Vulnerable:
- Yes
- Security database references:
- In the Debian bugtracking system: Bug 453278.
In Mitre's CVE dictionary: CVE-2007-6110. - More information:
-
Michael Skibbe discovered that htdig, a WWW search system for an intranet or small internet, did not adequately quote values submitted to the search script, allowing remote attackers to inject arbitrary script or HTML into specially crafted links.
For the old stable distribution (sarge), this problem was not present.
For the stable distribution (etch), this problem has been fixed in version 1:3.2.0b6-3.1etch1.
For the unstable distribution (sid), this problem has been fixed in version 1:3.2.0b6-4.
We recommend that you upgrade your htdig package.
- Fixed in:
-
Debian GNU/Linux 4.0 (etch)
- Source:
- http://security.debian.org/pool/updates/main/h/htdig/htdig_3.2.0b6-3.1etch1.dsc
- http://security.debian.org/pool/updates/main/h/htdig/htdig_3.2.0b6.orig.tar.gz
- http://security.debian.org/pool/updates/main/h/htdig/htdig_3.2.0b6-3.1etch1.diff.gz
- http://security.debian.org/pool/updates/main/h/htdig/htdig_3.2.0b6.orig.tar.gz
- Architecture-independent component:
- http://security.debian.org/pool/updates/main/h/htdig/htdig-doc_3.2.0b6-3.1etch1_all.deb
- Alpha:
- http://security.debian.org/pool/updates/main/h/htdig/htdig_3.2.0b6-3.1etch1_alpha.deb
- AMD64:
- http://security.debian.org/pool/updates/main/h/htdig/htdig_3.2.0b6-3.1etch1_amd64.deb
- ARM:
- http://security.debian.org/pool/updates/main/h/htdig/htdig_3.2.0b6-3.1etch1_arm.deb
- HP Precision:
- http://security.debian.org/pool/updates/main/h/htdig/htdig_3.2.0b6-3.1etch1_hppa.deb
- Intel IA-32:
- http://security.debian.org/pool/updates/main/h/htdig/htdig_3.2.0b6-3.1etch1_i386.deb
- Intel IA-64:
- http://security.debian.org/pool/updates/main/h/htdig/htdig_3.2.0b6-3.1etch1_ia64.deb
- Big-endian MIPS:
- http://security.debian.org/pool/updates/main/h/htdig/htdig_3.2.0b6-3.1etch1_mips.deb
- Little-endian MIPS:
- http://security.debian.org/pool/updates/main/h/htdig/htdig_3.2.0b6-3.1etch1_mipsel.deb
- PowerPC:
- http://security.debian.org/pool/updates/main/h/htdig/htdig_3.2.0b6-3.1etch1_powerpc.deb
- IBM S/390:
- http://security.debian.org/pool/updates/main/h/htdig/htdig_3.2.0b6-3.1etch1_s390.deb
- Sun Sparc:
- http://security.debian.org/pool/updates/main/h/htdig/htdig_3.2.0b6-3.1etch1_sparc.deb
MD5 checksums of the listed files are available in the original advisory.